Sciweavers

316 search results - page 47 / 64
» Reducing the Cost of Generating APH-Distributed Random Numbe...
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
Symmetric Cryptography in Javascript
—We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, a...
Emily Stark, Michael Hamburg, Dan Boneh
DATE
2009
IEEE
90views Hardware» more  DATE 2009»
14 years 3 months ago
Property analysis and design understanding
—Verification is a major issue in circuit and system design. Formal methods like bounded model checking (BMC) can guarantee a high quality of the verification. There are severa...
Ulrich Kühne, Daniel Große, Rolf Drechs...
IROS
2007
IEEE
162views Robotics» more  IROS 2007»
14 years 2 months ago
Genetic MRF model optimization for real-time victim detection in search and rescue
— One primary goal in rescue robotics is to deploy a team of robots for coordinated victim search after a disaster. This requires robots to perform subtasks, such as victim detec...
Alexander Kleiner, Rainer Kümmerle
EKAW
2000
Springer
14 years 6 days ago
Informed Selection of Training Examples for Knowledge Refinement
Knowledge refinement tools rely on a representative set of training examples to identify and repair faults in a knowledge based system (KBS). In real environments it is often diffi...
Nirmalie Wiratunga, Susan Craw
MP
2002
103views more  MP 2002»
13 years 8 months ago
Detecting Jacobian sparsity patterns by Bayesian probing
In this paper we describe an automatic procedure for successively reducing the set of possible nonzeros in a Jacobian matrix until eventually the exact sparsity pattern is obtained...
Andreas Griewank, Christo Mitev